CN108022100B - Cross authentication system and method based on block chain technology - Google Patents

Cross authentication system and method based on block chain technology Download PDF

Info

Publication number
CN108022100B
CN108022100B CN201711225310.3A CN201711225310A CN108022100B CN 108022100 B CN108022100 B CN 108022100B CN 201711225310 A CN201711225310 A CN 201711225310A CN 108022100 B CN108022100 B CN 108022100B
Authority
CN
China
Prior art keywords
service platform
user equipment
platform
service
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711225310.3A
Other languages
Chinese (zh)
Other versions
CN108022100A (en
Inventor
申子熹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Anhuang Lingyu Technology Co ltd
Original Assignee
Jiangsu Anhuang Lingyu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Anhuang Lingyu Technology Co ltd filed Critical Jiangsu Anhuang Lingyu Technology Co ltd
Priority to CN201711225310.3A priority Critical patent/CN108022100B/en
Publication of CN108022100A publication Critical patent/CN108022100A/en
Application granted granted Critical
Publication of CN108022100B publication Critical patent/CN108022100B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention discloses a cross authentication system and a method based on a block chain technology, which relate to the technical field of block chains, and the system comprises: the system comprises user equipment, a first service platform, a second service platform and a block chain platform, wherein the first service platform and the second service platform are respectively connected with nodes in the block chain platform, the first service platform is used for providing service for the user equipment, the second service platform is used for providing service for other user equipment, the user equipment is connected with the second service platform, and the second service platform is used for performing cross authentication on the user equipment through the first service platform and providing service for the user equipment when the cross authentication is passed; the method and the system can realize cross authentication among different service platforms, reduce the number of account passwords required to be memorized by a user, realize data exchange and sharing among different service platforms, and contribute to unified service for the user by each service platform.

Description

Cross authentication system and method based on block chain technology
Technical Field
The invention relates to the technical field of block chains, in particular to a cross authentication system and a cross authentication method based on a block chain technology.
Background
The internet virtual world is continuously blended with the real world, more and more network services are received by users, and different intelligent hardware used by users is generally provided with services by different service platforms. For example, a user has an intelligent bracelet, an intelligent watch, and a bluetooth card, and the three pieces of intelligent equipment belong to different hardware manufacturers, and it is likely that authentication needs to be performed on a service platform corresponding to each piece of intelligent equipment. The service platforms are managed by the enterprises to which the service platforms belong respectively, the service platforms are independent from each other, data are inconsistent, the information sharing degree is low, and authentication and identity management of users are troublesome.
Disclosure of Invention
The invention provides a cross authentication system and a cross authentication method based on a block chain technology aiming at the problems and technical requirements, and the system and the method can realize cross mutual authentication between different service platforms and provide a basis for data exchange of each service platform.
The technical scheme of the invention is as follows:
a cross-certification system based on blockchain technology, the system comprising: the system comprises user equipment, a first service platform, a second service platform and a block chain platform, wherein the block chain platform comprises at least three nodes, the at least three nodes are mutually communicated and connected, the first service platform and the second service platform are respectively connected with nodes in the block chain platform, the first service platform is a service platform for providing services for the user equipment, the second service platform is a service platform for providing services for other user equipment, the user equipment is connected with the second service platform, and the second service platform is used for performing cross authentication on the user equipment through the first service platform and providing services for the user equipment when the cross authentication is passed.
A cross-certification method based on block chain technology is used in the cross-certification system, and the method includes:
the user equipment initiates an authentication request to the second service platform, wherein the authentication request comprises a user equipment identifier of the user equipment;
the second service platform receives the authentication request and reads the user equipment identification;
the second service platform sends the user equipment identification to the block chain platform;
the node in the block chain platform inquires transaction information corresponding to the user equipment identification in the block chain and returns the transaction information to the second service platform, wherein the transaction information is the identity transaction information added in the block chain by each node of the block chain platform after the first service platform initiates the identity transaction with the user equipment, and the transaction information at least comprises the service platform identification of the first service platform;
the second service platform initiates a cross-certification request to the first service platform according to the service platform identification of the first service platform;
and when the first service platform passes the cross-certification request, the second service platform provides service for the user equipment.
The further technical scheme is that the second service platform initiates a cross-certification request to the first service platform according to the service platform identifier of the first service platform, and the method comprises the following steps:
the second service platform requests a random number from the first service platform according to the service platform identification of the first service platform;
the second service platform sends the random number returned by the first service platform to the user equipment;
the user equipment signs the random number according to the stored equipment private key to obtain a signature result, and sends the signature result to the second service platform;
the second service platform sends the user equipment identification and the signature result to the first service platform;
the first service platform verifies whether the signature result is correct according to the user equipment identification;
and when the first service platform determines that the signature result is correct, the first service platform passes the cross-certification request.
The further technical scheme is that the first service platform verifies whether the signature result is correct according to the user equipment identifier, and the method comprises the following steps:
the first service platform inquires a public key address of an equipment public key corresponding to the user equipment identification in a stored public key address list, and the public key address list stores public key addresses corresponding to all user equipment served by the first service platform;
and the first service platform verifies the signature result by using the inquired public key address.
A further technical solution is that the transaction information further includes a public key address of a device public key corresponding to the user device identifier, and then the method further includes:
the second service platform verifies the signature result by using the public key address included in the transaction information;
and when the first service platform and the second service platform respectively determine that the signature result is correct, the first service platform passes the cross-certification request.
The further technical scheme is that the transaction information also comprises a user equipment state identifier, and then the method also comprises the following steps:
the second service platform determines the state of the user equipment according to the state identifier of the user equipment, wherein the state of the user equipment is in a use state or in a logout state;
and if the user equipment state identifier indicates that the user equipment is in a use state, the second service platform executes a step of initiating a cross-certification request to the first service platform according to the service platform identifier of the first service platform.
The further technical scheme is that the method also comprises the following steps:
the user equipment generates a pair of keys corresponding to the first service platform, wherein the pair of keys comprises an equipment private key and an equipment public key, and the user equipment stores the equipment private key;
the user equipment sends a binding request to the first service platform, wherein the binding request comprises a user equipment identifier and a public key address of an equipment public key;
and the first service platform receives the binding request and correspondingly stores the user equipment identification and the public key address in a public key address list.
The further technical scheme is that the method also comprises the following steps:
the first service platform receives the binding request and initiates identity transaction according to the binding request;
each node in the blockchain platform adds transaction information for the identity transaction to the blockchain.
The beneficial technical effects of the invention are as follows:
according to the method, after a first service platform is accessed to a block chain platform, authentication information related to a user and user equipment is desensitized and then added to a block chain, after a second service platform of another third party is accessed to the block chain platform, the second service platform can acquire related authentication information and perform cross mutual authentication with the first service platform according to the authentication information, and after the cross authentication is successful, the second service platform can acquire data related to the user from the first service platform so as to provide service for the user equipment.
Drawings
Fig. 1 is a system configuration diagram of a cross-certification system based on a block chain technology disclosed in the present application.
Fig. 2 is a flowchart of a cross-certification method based on a block chain technique disclosed in the present application.
Detailed Description
The following further describes the embodiments of the present invention with reference to the drawings.
The present application discloses a cross-certification system based on block chain technology, please refer to fig. 1, the system includes: a blockchain platform 10, a first service platform 20, a second service platform 30 and a user equipment 40. The blockchain platform 10 includes at least three nodes, and the at least three nodes establish communication connections with each other, where the nodes may be various devices such as a computer, a server, a workstation, and a printer, for example, fig. 1 illustrates the blockchain platform 10 including a first node 11, a second node 12, and a third node 13. The first service platform 20 and the second service platform 30 are respectively connected to nodes in the block chain platform, and the first service platform 20 and the second service platform 30 may be connected to the same node or different nodes, as shown in fig. 1, for example, the first service platform 20 is connected to the first node 11, and the second service platform 30 is connected to the second node 12. It should be noted that, in actual implementation, the number of service platforms accessing to a block chain platform is large, and the "first" and the "second" in the present application have no specific meaning and are only used to distinguish two different service platforms. The first service platform 20 is configured to provide services for a user equipment 40, the second service platform 30 is configured to provide services for other user equipments, the user equipment 40 is an intelligent hardware device such as a computer, a smart phone, a smart band, a smart watch, and a bluetooth card, and each service platform may be connected to and provide services for a plurality of user equipments, which is not limited in this application. The user equipment 40 is connected to the second service platform 30, and since the second service platform 30 is not a service platform for providing services to the user equipment 40, the user equipment 40 cannot directly perform authentication on the second service platform 30, and the second service platform 30 cannot directly provide services to the user equipment 40, but in the structure shown in fig. 1, the first service platform 20 and the second service platform 30 are respectively connected to the block chain platform 10, and then the second service platform 30 can perform cross authentication on the user equipment 40 through the first service platform 20, and provide services to the user equipment 40 when the cross authentication is passed.
In the application, the user equipment 40 is bound with the first service platform 20 corresponding to itself in advance, the first service platform 20 may initiate an identity transaction with the user equipment 40 and each node of the blockchain platform 10 adds transaction information of the identity transaction in the blockchain, so that each service platform accessing the blockchain platform 10 can obtain the transaction information, and the binding and identity transaction processes are as follows:
the user device 40 generates a pair of keys corresponding to the first service platform 20, where the pair of keys includes a device private key and a device public key, and the user device 40 stores the device private key, and the device private key cannot be derived. The user equipment 40 sends a binding request to the first service platform 20, where the binding request includes a user equipment identifier and a public key address of the device public key, and the user equipment identifier is used to identify the user equipment 40 and corresponds to the user equipment 40 one to one, and may be an IMEI (International mobile equipment Identity) number or an MAC address (Media Access Control, physical address) of the user equipment 40. The first service platform 20 receives the binding request, correspondingly stores the user equipment identifier and the public key address in a public key address list, and simultaneously initiates an identity transaction according to the binding request, wherein transaction information of the identity transaction comprises a destination address of the identity transaction, a transaction type identifier, a service platform identifier of the first service platform 20, the user equipment identifier, an account identifier and a user equipment state identifier. The destination address of the identity transaction is the public key address of the device public key of the user device 40; the transaction type identifier is used for identifying that the identity transaction is initiated; the service platform identifier is used for identifying the first service platform 20, and the identifier corresponds to the first service platform 20 one to one; the account identifier is used for identifying the identity of the user in the first service platform 20, and the account identifier is generated by the first service platform 20 according to a preset rule; the user state identifier is used for identifying that the user equipment is in a use state or in a log-off state. The first service platform 20 broadcasts an identity transaction to the blockchain platform 10, each node in the blockchain platform 10 adds transaction information of the identity transaction to the blockchain when verifying that the identity transaction is legal, the transaction information added by each node of the blockchain platform 10 may not include a transaction type identifier, and the storage form of the transaction information may be HID | | | AddrA | | | | AppA | | | | | IDA | | | | Status, where HID is a user equipment identifier, AddrA is a destination address of the identity transaction, that is, a public key address of an equipment public key of the user equipment 40, apa is a service platform identifier of the first service platform 20, IDA is an account identifier, and Status is a user equipment state identifier of the user equipment 40.
To this end, each node of the blockchain platform 10 has added transaction information of identity transaction between the first service platform 20 and the user equipment 40 to the blockchain, and on this basis, the second service platform 30 in the system shown in fig. 1 can perform cross authentication on the user equipment 40 through the first service platform 20, and the cross authentication process includes the following steps, please refer to the flowchart shown in fig. 2:
step 1: and the user equipment initiates an authentication request to the second service platform, wherein the authentication request comprises the user equipment identification of the user equipment.
Step 2: and the second service platform receives the authentication request and reads the user equipment identification.
And step 3: and the second service platform sends the user equipment identification to the node in the block chain platform.
And 4, step 4: the node in the block chain platform queries transaction information corresponding to the user equipment identifier in the block chain, and returns the transaction information to the second service platform.
And 5: the transaction information usually further includes a user equipment state identifier, and after receiving the transaction information, the second service platform determines a state of the user equipment according to the user equipment state identifier in the transaction information, where the state of the user equipment is in a use state or in a logout state, for example, when the user equipment state identifier is 1, it indicates that the user equipment is in the use state, and when the user equipment state identifier is 0, it indicates that the user equipment is in the logout state.
Step 6: if the user equipment state identifier indicates that the user equipment is in a logout state, the second service platform may not respond to the authentication request initiated by the user equipment.
And 7: and if the user equipment state identifier indicates that the user equipment is in a use state, the second service platform requests the random number R from the first service platform according to the service platform identifier of the first service platform.
And 8: the first service platform returns the random number R to the second service platform.
And step 9: and the second service platform sends the random number R to the user equipment.
Step 10: and the user equipment signs the random number R according to the stored equipment private key to obtain a signature result S, and sends the signature result S to the second service platform.
Step 11: and the second service platform sends the user equipment identification and the signature result to the first service platform.
Step 12: as described above, when the first service platform is bound to any one of the user devices served by the first service platform, the user device identifier and the public key address corresponding to the user device identifier are stored, so that the public key address list of the first service platform stores the public key address corresponding to each user device served by the first service platform, and the first service platform queries the public key address of the device public key corresponding to the user device identifier in the stored public key address list.
Step 13: the first service platform verifies the signature result S by using the inquired public key address, if the binding relationship between the user equipment and the first service platform is correctly established, the equipment public key corresponding to the public key address inquired by the first service platform and the equipment private key used when the user equipment signs belong to a pair of secret keys, and on the basis, if the signature result S is not tampered, the first service platform verifies by using the public key address to determine that the signature result is correct; and if the signature result S is tampered, the first service platform uses public key address verification to determine that the signature result is incorrect. When the first service platform determines that the signature result is correct, the first service platform requests through cross-authentication, and the second service platform can start to request data related to the user from the first service platform and provide service for the user equipment.
The transaction information usually also includes a public key address of an equipment public key corresponding to the user equipment identifier, and in order to further improve security, the second service platform also uses the public key address included in the transaction information to verify a signature result, when the first service platform and the second service platform respectively determine that the signature results are correct, the first service platform passes through the cross-authentication request, and the second service platform can start to request data related to the user from the first service platform and provide service for the user equipment.
What has been described above is only a preferred embodiment of the present application, and the present invention is not limited to the above embodiment. It is to be understood that other modifications and variations directly derivable or suggested by those skilled in the art without departing from the spirit and concept of the present invention are to be considered as included within the scope of the present invention.

Claims (6)

1. A cross-certification method based on block chain technology, the method being used in a cross-certification system, the cross-certification system comprising: the method comprises the following steps that the blockchain platform comprises at least three nodes, communication connection is established among the at least three nodes, the first service platform and the second service platform are respectively connected with nodes in the blockchain platform, the first service platform is a service platform used for providing service for the user equipment, the second service platform is a service platform used for providing service for other user equipment, the user equipment is connected with the second service platform, and the second service platform is used for performing cross authentication on the user equipment through the first service platform and providing service for the user equipment when the cross authentication is passed, wherein the method comprises the following steps:
the user equipment initiates an authentication request to the second service platform, wherein the authentication request comprises a user equipment identifier of the user equipment;
the second service platform receives the authentication request and reads the user equipment identification;
the second service platform sends the user equipment identifier to the block chain platform;
the nodes in the block chain platform inquire transaction information corresponding to the user equipment identification in a block chain and return the transaction information to the second service platform, wherein the transaction information is the transaction information of the identity transaction added in the block chain by each node of the block chain platform after the first service platform initiates the identity transaction with the user equipment, and the transaction information at least comprises the service platform identification of the first service platform;
the second service platform initiates a cross-certification request to the first service platform according to the service platform identification of the first service platform; the method comprises the following steps: the second service platform requests a random number from the first service platform according to the service platform identification of the first service platform; the second service platform sends the random number returned by the first service platform to the user equipment; the user equipment signs the random number according to a stored equipment private key to obtain a signature result, and sends the signature result to the second service platform; the second service platform sends the user equipment identification and the signature result to the first service platform; the first service platform verifies whether the signature result is correct or not according to the user equipment identification; when the first service platform determines that the signature result is correct, the first service platform passes the cross-certification request;
and when the first service platform passes the cross-certification request, the second service platform provides service for the user equipment.
2. The method of claim 1, wherein the first service platform verifying whether the signature result is correct according to the ue identity comprises:
the first service platform inquires a public key address of an equipment public key corresponding to the user equipment identifier in a stored public key address list, and the public key address list stores public key addresses corresponding to all user equipment served by the first service platform;
and the first service platform verifies the signature result by using the inquired public key address.
3. The method of claim 1, wherein the transaction information further includes a public key address of a device public key corresponding to the user device identifier, the method further comprising:
the second service platform verifies the signature result by using the public key address included in the transaction information;
and when the first service platform and the second service platform respectively determine that the signature result is correct, the first service platform passes the cross-certification request.
4. A method according to any one of claims 1 to 3, wherein the transaction information further includes an identification of the status of the user equipment, the method further comprising:
the second service platform determines the state of the user equipment according to the state identifier of the user equipment, wherein the state of the user equipment is in a use state or in a logout state;
and if the user equipment state identifier indicates that the user equipment is in a use state, the second service platform executes the step of initiating a cross-certification request to the first service platform according to the service platform identifier of the first service platform.
5. The method of claim 2, further comprising:
the user equipment generates a pair of keys corresponding to the first service platform, wherein the pair of keys comprises an equipment private key and an equipment public key, and the user equipment stores the equipment private key;
the user equipment sends a binding request to the first service platform, wherein the binding request comprises the user equipment identification and a public key address of the equipment public key;
and the first service platform receives the binding request and correspondingly stores the user equipment identification and the public key address of the equipment public key in the public key address list.
6. The method of claim 5, further comprising:
the first service platform receives the binding request and initiates identity transaction according to the binding request;
each node in the blockchain platform adds transaction information of the identity transaction to a blockchain.
CN201711225310.3A 2017-11-29 2017-11-29 Cross authentication system and method based on block chain technology Active CN108022100B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711225310.3A CN108022100B (en) 2017-11-29 2017-11-29 Cross authentication system and method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711225310.3A CN108022100B (en) 2017-11-29 2017-11-29 Cross authentication system and method based on block chain technology

Publications (2)

Publication Number Publication Date
CN108022100A CN108022100A (en) 2018-05-11
CN108022100B true CN108022100B (en) 2020-07-21

Family

ID=62077509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711225310.3A Active CN108022100B (en) 2017-11-29 2017-11-29 Cross authentication system and method based on block chain technology

Country Status (1)

Country Link
CN (1) CN108022100B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737536B (en) * 2018-05-14 2021-11-09 百度在线网络技术(北京)有限公司 Method, device, equipment and storage medium for realizing block chain system
CN109146482B (en) * 2018-08-29 2022-02-01 北京京东尚科信息技术有限公司 Block chain-based user rights and interests providing method and device
CN109767215A (en) * 2018-12-29 2019-05-17 杭州趣链科技有限公司 A kind of online block chain identity identifying method based on a variety of private key storage modes
CN110191188B (en) * 2019-06-02 2021-09-14 四川虹微技术有限公司 Data processing method, block chain network and storage medium
CN110941611B (en) * 2019-11-06 2022-04-15 四川长虹电器股份有限公司 Identification analysis system implementation method based on block chain technology and identification coding technology
CN112163845B (en) * 2020-09-29 2024-03-22 深圳前海微众银行股份有限公司 Transaction identity confirmation method and device for cross-region block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101678795B1 (en) * 2015-11-30 2016-11-22 전삼구 Iot-basesd things management system and method using block chain authentification
CN106789089A (en) * 2017-02-23 2017-05-31 腾讯科技(深圳)有限公司 A kind of method and system for managing certificate
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101678795B1 (en) * 2015-11-30 2016-11-22 전삼구 Iot-basesd things management system and method using block chain authentification
CN106789089A (en) * 2017-02-23 2017-05-31 腾讯科技(深圳)有限公司 A kind of method and system for managing certificate
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
申子熹:腾讯TUSI物联网联合实验室成立,建立可信任的智慧城市;网总管编辑侠;《http://www.91wzg.com/study/18376.html》;20170912;第1-2页 *

Also Published As

Publication number Publication date
CN108022100A (en) 2018-05-11

Similar Documents

Publication Publication Date Title
CN108022100B (en) Cross authentication system and method based on block chain technology
CN105933353B (en) The realization method and system of secure log
CN102394887B (en) OAuth protocol-based safety certificate method of open platform and system thereof
US10460309B2 (en) Payment verification method, apparatus and system
CN108009825A (en) A kind of identity management system and method based on block chain technology
EP2854433A1 (en) Method, system and related device for realizing virtual sim card
CN108512862A (en) Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques
CN107547573B (en) authentication method applied to eSIM, RSP terminal and management platform
CN110266642A (en) Identity identifying method and server, electronic equipment
CN102006271A (en) IP address secure multi-channel authentication for online transactions
CN103944737A (en) User identity authentication method, third-party authentication platform and operator authentication platform
CN103249045A (en) Identification method, device and system
CN101986598B (en) Authentication method, server and system
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN110944319B (en) 5G communication identity verification method, equipment and storage medium
CN112188493A (en) Authentication method, system and related equipment
CN101540757A (en) Method and system for identifying network and identification equipment
CN108924154A (en) Identity identifying method and device
CN103200159A (en) Network access method and equipment
WO2019056971A1 (en) Authentication method and device
US20140330689A1 (en) System and Method for Verifying Online Banking Account Identity Using Real-Time Communication and Digital Certificate
CN105790945B (en) A kind of authentication method, device and system realizing user's unique identities and authenticating
CN104869121A (en) 802.1x-based authentication method and device
CN102970308A (en) User authentication method and server
CN106453349A (en) An account number login method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant